Contact Us

|

Careers

|

Change Locale
close

Posts by Stephen Perciballi

Featured Article
From the experts | August 29, 2013 by Stephen Perciballi
Our latest infographic examines the differences between the user experience and the IT experience when implementing a BYOD strategy. From user demands for anywhere access to network security, and quick application loading times to a virtual desktop infrastructures, this infographic aims to help you ensure your back-end can support the new demands BYOD places on […]
Featured Article
Client Computing | August 7, 2013 by Stephen Perciballi
One of the perks working closely with the Blackberry team is getting our hands on new devices. I’ve been using the Z10 since November and have been really enjoying it. A review and video can be found here. Many of the people I’ve been working with have been anxiously awaiting the latest BlackBerry with full, […]
Featured Article
Over the years our goal has always been to help our customers become more successful, more productive and more competitive. This year, we have chosen to narrow our focus even more to one major WIG – wildly important goal – that will guide our offerings for the next year. This is the year when it […]
Featured Article
Client Computing | January 29, 2013 by Stephen Perciballi
The new BlackBerry 10 has arrived! Because Softchoice is part of the BlackBerry Technical Preview Program, we had exclusive access to the technology (handset and server software) before its official release, and I was able to spend a couple of weeks using the device. During that time, I had a chance to form some pretty strong […]
Featured Article
Client Computing | January 28, 2013 by Stephen Perciballi
Considering BlackBerry out of the game is like saying you won’t drink water out of your tap now knowing that Coke exists. If you are interested in securely managing data on your smartphones and tablets you should at least look at Blackberry Enterprise Service 10 (BES 10) and BlackBerry 10 (BB 10). While the competition is definitely popular, there […]
Featured Article
From the experts | September 6, 2012 by Stephen Perciballi
In the world of IT, ten years feels like a few lifetimes. Just think … A decade ago, you needed a huge capital investment and a team of professionals to buy, install and manage software. Today, low-cost SaaS and high-bandwidth Internet allow you to receive most business technologies through the cloud. Ten years ago, employees […]
Featured Article
Lots of organizations are deploying Security Information and Event Management (SIEM) systems either to do their due diligence or because it’s part of a regulatory requirement. One of the misconceptions that typically is derived from marketing material is that you plug it in, turn it on, and voila, instant security. This couldn’t be further from […]
Featured Article
So many names. It always reminds me of the line from The Devil’s Advocate when Pacino says “Oh, I have so many names.” Security Information Management, Security Information and Event Management, SIM, SIEM, Log Management, Log Aggregation. If you really like to use buzz words you could call this Big Data for Security. This technology […]
Featured Article
Long gone is the perceived image of the malware perpetrator as an outcast-teenager sitting in his parent’s basement. Today’s internet thieves are more organized and technically savvy than ever. Years ago, security threats were simpler. There were Trojans, worms, and rootkits – and the differences between each were clear.  Now known collectively as “malware”, the differences between these […]
Featured Article
 So you’re sold on virtualization being the answer to controlling hardware costs in your organization’s long-awaited great Windows 7 implementation. But, you may be wondering, what about all my apps? In other words, you’ve found a resource-friendly way to implement Windows 7 but you worry that won’t amount to a hill of beans for users […]
Featured Article
IT leaders are probably in the best position to help prevent a “fire, ready, aim” approach to using social media. This may sound counter-intuitive at first. After all, IT blocks social media, right? Not so. I’d argue that any organization that’s getting serious about using social media has a lot to gain by leveraging IT […]
Featured Article
Networking is a word that for many causes trepidation and excitement at the same time, and I’m not necessarily talking only about networking equipment in IT, I’m also talking about human networking. We all know how nerve racking it can be to step into a room full of strangers with the goal of branching out […]
Featured Article
What are you going to get out of this blog? As technology advances, it is paramount that organizations capitalize on the potential efficiencies to be gained and both adapt and embrace change.  Over the past 20 years we have helped our clients optimize their existing infrastructures while integrating new technologies to help the business mitigate […]
Featured Article
How load balancing is helping deliver on the promise of application virtualization. From systems and storage to networks, virtually every nook and cranny of the IT environment these days is being virtualized. Applications, of course, are no exception, and for good reason. By isolating applications from the underlying operating system and from other applications, then […]
Featured Article
From the experts | December 16, 2011 by Stephen Perciballi
Ask IT professionals what their number one priority is in the next 12 months and in coming years and they’re likely to tell you increased usage of virtualization. No big surprise really since, for some time now, virtualization has been one of the most effective tools for driving efficiencies and effectiveness (and of course, saving […]
Featured Article
From the experts | August 10, 2011 by Stephen Perciballi
In today’s dynamic and ever changing IT landscape there is a lot of emphasis on purchasing technologies that do more with less, increase performance, and make existing approaches more efficient. Clients are turning to their trusted advisors and asking them to sift through all the stories, FUD and hype in the hopes that their solution […]
Featured Article
Previously we gave a high level view of securing a virtual environment. We talked about security gaps in the post and one of the biggest gaps is the lack of visibility between virtual machines on the same server. In a physical world, you have a network based Firewall and possibly a Unified Threat Management device securing the […]
Featured Article
We’ve been thinking about cloud a lot.  My goal is to help demystify security in a virtual environment. What are we doing with cloud computing? There are still servers, storage, networking, software, and security.  We’re really just implementing them in different ways. Rather than having file servers at every location we are centralizing our data […]
Featured Article
Client Computing | November 15, 2010 by Stephen Perciballi
Okay, you don’t like seatbelts. Too confining, you say. You drive carefully, right? Or, you only use your car for short trips around the block. Of course, that all may sound pretty persuasive until you have an accident – and your arguments, among other things, fly out the window. Which brings me to the ongoing […]

Categories